<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Whitehat83</title>
    <description>The latest articles on DEV Community by Whitehat83 (@whitehat83).</description>
    <link>https://dev.to/whitehat83</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1171966%2Ff251dd25-3fc8-436c-aff4-34ce272c419d.png</url>
      <title>DEV Community: Whitehat83</title>
      <link>https://dev.to/whitehat83</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/whitehat83"/>
    <language>en</language>
    <item>
      <title>How to Set Up A Honeypot in 10 Minutes</title>
      <dc:creator>Whitehat83</dc:creator>
      <pubDate>Tue, 20 Aug 2024 16:57:46 +0000</pubDate>
      <link>https://dev.to/whitehat83/how-to-set-up-a-honeypot-in-10-minutes-36ko</link>
      <guid>https://dev.to/whitehat83/how-to-set-up-a-honeypot-in-10-minutes-36ko</guid>
      <description>&lt;p&gt;What is a honeypot you may ask? What is its significance and why is it crucial that we set one up? Honeypots are essentially decoy servers deployed alongside of your actual system in the network. Its purpose is to attract malicious attackers trying to get into your network. Honeypots can misdirect assailants and their constituents from getting into your network. It can also help serve as a great way to add security monitoring opportunities for blue teams.&lt;/p&gt;

&lt;p&gt;Here’s how to entice possible attackers into a honeypot trap with Kali Linux.&lt;/p&gt;

&lt;p&gt;You’ll need a Kali Linux box and download a tool called pentbox.&lt;/p&gt;

&lt;p&gt;Open the terminal and download pentbox with the command.&lt;/p&gt;

&lt;p&gt;wget &lt;a href="http://downloads.sourceforge.net/project/pentbox18realised/pentbox-1.8.tar.gz" rel="noopener noreferrer"&gt;http://downloads.sourceforge.net/project/pentbox18realised/pentbox-1.8.tar.gz&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;What this command does is point it to this website and download the tool.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2btt674eej7ehvo7gejs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2btt674eej7ehvo7gejs.png" alt="Image description" width="720" height="38"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Find it in your directory, which ever it may be, mine happens to be at home directory.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fosu42dkww811gh3dte0p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fosu42dkww811gh3dte0p.png" alt="Image description" width="720" height="239"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqq3a9psp4glj5f1ltkgn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqq3a9psp4glj5f1ltkgn.png" alt="Image description" width="549" height="29"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;tar xvfz pentbox-1.8.tar.gz&lt;/p&gt;

&lt;p&gt;Then we run the command to “unload” the tools. The tar command is used to rip a collection of files and directories into a highly compressed archive file commonly called tarball.&lt;/p&gt;

&lt;p&gt;Then we execute the following command ./pentbox.rb&lt;/p&gt;

&lt;p&gt;And then, following should pop up.&lt;/p&gt;

&lt;p&gt;Now the juicy part, the reason why we’re here. To lure the attackers.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fav1ny85swqenor6j31lk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fav1ny85swqenor6j31lk.png" alt="Image description" width="720" height="613"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;From here we select 2 for Network tools and then 3 for Honeypot.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F609chc5hdj9qmfxyg4jf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F609chc5hdj9qmfxyg4jf.png" alt="Image description" width="720" height="564"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then select option 1 for Fast Auto Configuration. Once this is selected, it will launch the honey pot and default to port 80.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz5hkyw499ewnt50bbem6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz5hkyw499ewnt50bbem6.png" alt="Image description" width="720" height="682"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now open a web browser on another machine such as your host machine and point it to the IP address on your kali machine. My Kali box IP was 10.0.2.4. You can use the commands ip address or ifconfig | grep inet.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Freinbvo7t9xovwmuwuiz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Freinbvo7t9xovwmuwuiz.png" alt="Image description" width="720" height="338"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You should get an access denied and if you did that’s right.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F47018g7lpfezg5i6ez1a.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F47018g7lpfezg5i6ez1a.png" alt="Image description" width="416" height="304"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You should see the following.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu5zajhhetvdq5fh7wfd3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu5zajhhetvdq5fh7wfd3.png" alt="Image description" width="720" height="423"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you would like to dig deeper and have your honeypot listen to a specific port. You would run bentbox as such and select 2 and then 3 followed by 2. When the script prompts you to enter a port type in 22. Port 22 is the for SSH&lt;/p&gt;

&lt;p&gt;When I try to SSH in to the IP address I get the following “INTRUSION ATTEMPT DETECTED!”&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy5k2llola41r5gobn999.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy5k2llola41r5gobn999.png" alt="Image description" width="720" height="45"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc86y1t9dw4agbifrsh2z.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc86y1t9dw4agbifrsh2z.png" alt="Image description" width="720" height="559"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;you can see the attempt was logged and where the IP was originated from.&lt;/p&gt;

&lt;p&gt;Congrats! Now you have successfully set up your Honeypot!&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
